View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Sourcefire releases new applications to control mobile malware on enterprise networks

The combination of FireSIGHT and FireAMP Mobile will help organisations identify mobile devices connecting to the network

By CBR Staff Writer

Cybersecurity firm Sourcefire has enhanced its FireSIGHT and FireAMP applications to protect enterprises against advanced threats originating from mobile devices connecting to the enterprise network and help organisations deal with Bring Your Own Device (BYOD) challenges.

The combination of FireSIGHT and FireAMP Mobile will help organisations identify mobile devices connecting to the network, determine whether a device is at risk and then take measures to protect it.

FireSIGHT provides enterprises with increased visibility into the number and types of devices connecting to the network as well as the applications they are running.

It also inspects mobile protocols to identify vulnerabilities and potential attacks against the mobile devices.

FireAMP Mobile integrates cloud-based analysis capabilities to examine a mobile application for malware, enabling it to deliver real-time protection against newly discovered threats.

It also empowers organisations to block and control malicious and unwanted applications, while allowing trustworthy applications.

FireAMP Mobile also enables users to generate reports that provide threat intelligence, specific to their environments. These reports include the top mobile malware incidents and blacklisted and/or non-whitelisted apps that have been installed on mobile devices.

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

Sourcefire founder and CTO Martin Roesch said, "Sourcefire’s approach to Information Superiority provides organizations with an unparalleled level of context and intelligence so that they can take the appropriate measures to block mobile malware from spreading through the corporate network."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.